International Journal of Engineering Trends and Technology

Displaying 1-40 of 539 results

Data link layer is the protocol layer which transfers data between connected networks. It provides the functional and procedural means to transfer data between network and its nodes. It also provides the means to rectify the errors and usually correct it that may occur in the physical layer. Study and...

Provided By International Journal of Engineering Trends and Technology

In this paper, the authors study and analyze the spatially correlated fading channel, its basic concepts, brief mathematical modeling and simulation of correlation function of a MIMO system. The review paper in presents the effect of antenna parameters on the correlation property of a MIMO system and hence the system...

Provided By International Journal of Engineering Trends and Technology

Extensible location-dependent spatial object that searches for spatial object on road networks. Here it provides distance indexing technique and providing a dynamic object mapping mechanism of spatial object search. It is very efficient and flexible for various types of queries, namely, range search and nearest neighbor search, on objects over...

Provided By International Journal of Engineering Trends and Technology

In communication system there are many issues about intrusion detection and they are classified into two types such as ID based intrusion detection and Host based intrusion detection. The ID based intrusion detection mainly works on unique ID of the users which means this method track the intruders based on...

Provided By International Journal of Engineering Trends and Technology

Wireless communication has drastically shown evaluation mobile communication and its counterparts. Code Division Multiple Access (CDMA) is one of the reliable multiple access methods appropriate for sustaining lots of new services for ex ample speech, video, multimedia applications, which are becoming progressively more important for mobile communications. The multiple data...

Provided By International Journal of Engineering Trends and Technology

In this paper, the authors give information about traffic light control system based on wireless sensor network. Here the traffic lights changes according to the density of the traffic. To identify the traffic density, the authors are going to use IR sensors. If there is more density automatically the highest...

Provided By International Journal of Engineering Trends and Technology

The main concept of this proposed system is to avoid accidents. Accident happens mainly due to rash driving of vehicle or driving the vehicles with over speed. So accidents would be reduced when the vehicles will move with less speed. Firstly, the authors need to verify with which speed the...

Provided By International Journal of Engineering Trends and Technology

In this paper, the authors proposed a STTC-OFDM system which is based on IEEE 802.16e OFDMA specification and supports the distributed subcarrier allocation of Partial Usage of Sub Channels (PUSC) for DownLink (DL) transmission. The Fast Fourier Transforms (FFT) size 1048. The length of Cyclic Prefix (CP) is 128 sampling...

Provided By International Journal of Engineering Trends and Technology

In distributed networks or open environments nodes communicates with each other openly for transmission of data, there is a rapid research going on secure mining. Privacy preserving over data mining in distributed networks is still an important research issue in the field of Knowledge and data engineering or community based...

Provided By International Journal of Engineering Trends and Technology

Searching top k multi keywords from the out sourced data files is still an interesting research issue because out sourced data over cloud can be encrypted for confidentiality. In this paper, the authors are proposing an efficient top k retrieval from out sourced file through service oriented application by computing...

Provided By International Journal of Engineering Trends and Technology

In wireless sensor network, the energy efficiency is the key issue for designing the protocol because sensor nodes have one time battery backup. There are many modern protocols which extend the lifetime of the wireless sensor network by efficiently using battery power of the sensor node. In this paper, the...

Provided By International Journal of Engineering Trends and Technology

Most of the universities are enforcing affiliated colleges to implement biometric fingerprint attendance system to monitor student attendance. Biometric fingerprint scanner need to be installed in college where the student studying and it is monitored by the university online. There is possibility of adding fake finger print into the scanner...

Provided By International Journal of Engineering Trends and Technology

In addition to provide the security for data through image, the authors are using the concepts hybrid approach of encryption and compression techniques, before transmission of data they can encrypt it by using cryptographic technique. In this paper, they are using triple DES algorithm for data encryption and decryption, after...

Provided By International Journal of Engineering Trends and Technology

Searching for user interested query results is always complex task even though satisfying the user search goals because of various reasons. Optimizing the search engines in mobile phones is still an important research issue in the field of knowledge and data engineering, even though various approaches are available, performance and...

Provided By International Journal of Engineering Trends and Technology

Currently, instant communication is very possible all over the world due to a rapid growth in mobile phones technology. Each day, a number of mobile phones subscribers and cellular network coverage is escalating tremendously. Today's mobile phones are released with ability nearly to that of a desktop computer. The ubiquity...

Provided By International Journal of Engineering Trends and Technology

Sensor networks are highly sensitive to energy usage. They may, probably, be deployed in inhospitable or hostile environments, where it may not be possible to refresh energy sources. Hence, energy consumption is a major issue, and energy-aware protocols/applications are desirable. Energy consumption is observed at three stages, node communication, sensing...

Provided By International Journal of Engineering Trends and Technology

In the recent trends in optical communication to overcome one of the major problems in the new generation of radio over fiber networks that requires being concentrated, is decreasing the quantity of bit error rate in the lowest power penalty. This paper also evaluates the results of down-link 40Gbps OOK...

Provided By International Journal of Engineering Trends and Technology

The authors study a cohort selection technique to construct a space with good resolution in the online phase. The concept of cohort selection resembles that of the family of subset selection methods that find a subset of components from the entire set of components to model a signal of interest....

Provided By International Journal of Engineering Trends and Technology

Cooperative communication over wireless sensor networks is a challenging task and an interesting research issue in recent trends of senor networks. Even though various approach available for cooperative communication, performance is always a main factor. In this paper, the authors are proposing an efficient and empirical model of cache implementation...

Provided By International Journal of Engineering Trends and Technology

Virtual Machine (VM) technology being greater and fully developed, compute resources in cloud systems can be partitioned in fine granularity and allocated on demand, which contributes three technologies such as, formulating a deadline-driven resource allocation problem based on the cloud environment facilitated with VM resource isolation technology, and also to...

Provided By International Journal of Engineering Trends and Technology

Future wireless communication system have to be designed to integrate features such as high data rates, high quality of service and multimedia in the existing communication framework. Increased demand in wireless communication system has led to demand for higher network capacity and performance. Higher bandwidth, optimized modulation offer practically limited...

Provided By International Journal of Engineering Trends and Technology

The authors are proposing an empirical model of out sourcing of information to multiple data owners with secure key generation and two level authentication process, one is over data owners and other is over key generation center. Initially data owner level authentication cane performed with secret key and random challenges...

Provided By International Journal of Engineering Trends and Technology

Power consumption is the main criteria now-a-days in any embedded application. The less the power consumed the more the durability of the product. This paper is to establish a ultra low power RF link between two CC430F6147 transceiver units, one control unit and the other application unit such that their...

Provided By International Journal of Engineering Trends and Technology

In recent days transmitting digital media having large size data through the internet became simple task but providing security and security became big issue these days. Using pseudorandom permutation, image encryption is obtained. Confidentiality and access control is done by encryption. Image encryption has to be conducted prior to image...

Provided By International Journal of Engineering Trends and Technology

Now-a-days, wireless local area network rapidly increase of mobile device and more efficient of link setup mechanism. For the rapidly increase of WLAN the authors are also provide security of transferring data. For this purpose so many authentication protocol are proposed and one of the protocol is 802.11i. Through experiments...

Provided By International Journal of Engineering Trends and Technology

In social networks there are so many threats such as impersonation, data leakage. Most of the social networks are more worried about private data leakage. Some of them as intruders by deploying the security attacks like denial of service or hack the information. So the authors introduced a framework which...

Provided By International Journal of Engineering Trends and Technology

Cloud computing is recognized as one of the alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the Cloud Service Providers (CSPs) are able to deliver various services to cloud users with the help of powerful data centers, So that the sharing of...

Provided By International Journal of Engineering Trends and Technology

In cloud, transactional database provides authorization, it is one of most important for proof of authorization, it I the base for performance evaluation. In this paper, the authors are concentrating on mainly on three concepts i.e. one is the authorization of users in the cloud. For this they are using...

Provided By International Journal of Engineering Trends and Technology

Now-a-days, cloud storage gaining more popularity for sharing of data. The sharing of data with more securely, efficiently and flexible through others in the cloud storage. So that by providing security of sharing data the authors using cryptography technique. In this paper, they are using new public key cryptography technique...

Provided By International Journal of Engineering Trends and Technology

In networks transferring data is critical issue for providing security of data. Before transferring data if it checks the sent user is authenticate user or not. By providing security of data and authentication of user the authors proposed a technique. In this paper, they are implement two concepts for performing...

Provided By International Journal of Engineering Trends and Technology

Face recognition from the images is challenging due to the unpredictability in face appearances and the complexity of the image background. This paper proposes a different approach in order to recognize human faces. The face recognition is done by comparing the characteristics of the captured face to that of known...

Provided By International Journal of Engineering Trends and Technology

Retrieval of user interesting results over mobile search engine is always an interesting and important research issue in now-a-days of information retrieval, due to there is a rapid growth of mobile usage of user. Even though various traditional approaches available, performance and time complexity issues are the primary factors while...

Provided By International Journal of Engineering Trends and Technology

Data confidentiality over data mining in distributed networks is still an important and interesting research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is a basic factor while datasets or data integrates from different data holders or players for mining. Secure mining of...

Provided By International Journal of Engineering Trends and Technology

Various traditional mechanisms available for identification of unauthorized behavior or malicious activities of the incoming nodes like with their trust measures like direct trust, mutual trust. Servers maintain firewall log data of in and out traffic for intrusion detection and prevention mechanisms. Even though various approaches available to detect and...

Provided By International Journal of Engineering Trends and Technology

The authors study the problem of privacy-preservation in social networks. They consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links...

Provided By International Journal of Engineering Trends and Technology

In this paper, the authors first build up a wireless communication simulator including gray coding, modulation, different channel models (AWGN, flat fading and frequency selective fading channels), channel estimation, adaptive equalization, and demodulation. Next, they test the effect of different channel models to the data and image in receiver with...

Provided By International Journal of Engineering Trends and Technology

Identification and prevention of malicious nodes is always an interesting research issue in wireless sensor networks. In this paper, the authors are proposing an efficient approach for identification of anonymous or malicious node with signature and data rating techniques. Initially every node can be verified genuine or malicious node with...

Provided By International Journal of Engineering Trends and Technology

Using an unbounded number of rounds of communications, for each gate can be implemented in a way that requires only a constant number of rounds; the total number of rounds will still be linear in the depth of the underlying circuit. Secure mining in horizontal databases is a research issue...

Provided By International Journal of Engineering Trends and Technology

In this paper, the authors are to compare the existing full adders circuits and their performances to design a low power full adder having improved result as compared to existing full adders. The full adder circuit is a very important part in application like Digital Signal Process (DSP) design, chip...

Provided By International Journal of Engineering Trends and Technology

Firewall protection is local security policy in local networks. It will secure from unknown access of another nodes in the local network. Analyzing the firewall log data is always an interesting research area in the field of network traffic analysis. In this paper, the authors are proposing an efficient classification...

Provided By International Journal of Engineering Trends and Technology

Mobile cloud computing brings new types of services and facilities for mobile users to take full advantages of cloud computing. Interoperability becomes an important issue when mobile users need to interact and communicate with the cloud. The current interface between mobile users and cloud are mostly based on the web...

Provided By International Journal of Engineering Trends and Technology

In Mobile Ad-hoc networks, local broadcast algorithms can be differentiated with respect to the forwarding nodes. A forwarding node can either be statically or dynamically determined. If it is static then it is based on local topology information alone. If dynamic, it is based on both local topology and broadcast...

Provided By International Journal of Engineering Trends and Technology

Data cleaning is a basic data preprocessing technique for before forwarding the data to data mining approach, but it leads to an intresting research area in the field of data mining. Data cleaning is the process of finding and deleting noisy data/records from the database. The simplest technique used for...

Provided By International Journal of Engineering Trends and Technology

Data mining, or knowledge discovery in databases, refers to the discovery of interesting, implicit, and previously unknown knowledge from large databases. Spatial data mining presents new challenges due to the large size of spatial data, the complexity of spatial data types, and the special nature of spatial access methods. Spatial...

Provided By International Journal of Engineering Trends and Technology

Database performance is a very important aspect of database usability. The objective of this paper is to proposed policy to forecast the performance of transaction under real time database system in distributed environment. A real time database system in distributed environment is a transaction processing system design to handle the...

Provided By International Journal of Engineering Trends and Technology

In data warehousing when dealing with large amount of database, there are so many problems of updating of the database. In data-warehousing there is large amount of data can store in the database. For maintaining the updated database it takes more time. For more scalability it can take more processing...

Provided By International Journal of Engineering Trends and Technology

In this paper the authors describe an implementation for the method from texas instruments for a random number generator in the ultra-low power microcontroller MSP430x5xx families and the analysis of this generator in the concrete microcontroller MSP430f5438A. The generator may be used to generate numbers for cryptography security methods (for...

Provided By International Journal of Engineering Trends and Technology

Major cloud computing companies have begun to integrate frameworks for parallel data processing in their product portfolio, creating it simple for customers to access these services and to deploy their programs. However, the process frameworks that are presently used are designed for static, homogeneous cluster setups and disrespect the actual...

Provided By International Journal of Engineering Trends and Technology

Mobile ad hoc network is a cluster of wireless mobile nodes making a network with dynamically changing topology without using any permanent access point as a base station. To create connectivity among nodes more than single hop is needed due to low transmission range. Increasing of mobile nodes enhances this...

Provided By International Journal of Engineering Trends and Technology

Searching is more frequently using task for information gathering or browsing information from web. In this paper the authors can users search in different resources. Due to more scalability this searching process takes more time to process. So by using grouping similar data they can reduce the process time. This...

Provided By International Journal of Engineering Trends and Technology

Cloud computing allow the users to efficiently and dynamically provision computing resource to meet their IT needs. Cloud provider offers two subscription plan to the customer namely reservation and on-demand. The reservation plan is typically cheaper than on-demand plan. If the actual computing demand is known in advance reserving the...

Provided By International Journal of Engineering Trends and Technology

In this paper, the authors have started with an overview on fault tolerance based system. In case of design diversity based software fault tolerance system, they observed that uncertainty remains an important factor. Keeping this factor, they have discussed about implementing bayes' theorem and probabilistic mathematical model to handle the...

Provided By International Journal of Engineering Trends and Technology

Building high quality cloud applications becomes an urgently required research problem. Non functional performance of cloud services is usually described by Quality-of-Service (QoS). In cloud applications, cloud services are invoked remotely by internet connections. The QoS ranking of cloud services for a user cannot be transferred directly to another user,...

Provided By International Journal of Engineering Trends and Technology

For the security of data, various solutions algorithms were proposed. The AES also known as the Rijndael algorithm was selected as a standard by National Institute of Standards and Technology (NIST). Encryption algorithms are used to ensure security of transmission channels. This paper presents an efficient FPGA implementation approach of...

Provided By International Journal of Engineering Trends and Technology

In this paper realizes a reconfigurable correlator module can be utilized to data pattern recognition in remote sensing applications. Enhancement of data is one of the essential parts of the data processing in remote sensing applications. Enhancement of data possible electronically and effectively by reconfiguration computing. HDL code is used...

Provided By International Journal of Engineering Trends and Technology

In this paper the authors implemented for online examination security system. Here the authors are using finger print module for identification of each student and a web cam for taking the image of each student, all the finger prints and images will be stored in the data base using zigbee...

Provided By International Journal of Engineering Trends and Technology

The vehicle bus data acquisition and fault diagnosis system, focusing on its lower computer system and the upper computer system is designed. This system is based on the widely used CAN bus technology, to extract the vehicle's status or fault information. When the vehicle breaks down, the status of vehicle...

Provided By International Journal of Engineering Trends and Technology

In every field there is huge growth and demand in knowledge and information over the internet. The automation using data mining and predictive technologies are doing an advance amount of deals in the markets. Data mining is all based on the theory that the historic data holds the essential memory...

Provided By International Journal of Engineering Trends and Technology

A (k, n)-threshold visual cryptography strategy is proposed to encode a secret image into n shadow images, where any k or more of them can visually recover the secret image, but any k-1 or fewer of them gain no information about it. The decoding process of a visual cryptography strategy,...

Provided By International Journal of Engineering Trends and Technology

Mobile Adhoc NETwork (MANET) provides a superb chance to watch environments, and have lots of fascinating applications in warfare. The matter is that security mechanisms used for wired networks don't transfer on to sensing element networks. A number of this can be as a result of the very fact that...

Provided By International Journal of Engineering Trends and Technology

Visual Cryptography Scheme (VCS) is an encryption method that uses combinatorial techniques to encode secret written materials. The idea is to convert the written material into an image and encode this image into n shadow images. The decoding only requires only selecting some subset of these n images, making transparencies...

Provided By International Journal of Engineering Trends and Technology

Grid is an association of computer resources from several administrative domains to reach a mutual goal with an abstraction of service origination to the user. Fault tolerance is an important property in grid computing as the dependability of individual grid resources may not be guaranteed. Fault tolerant approach is useful...

Provided By International Journal of Engineering Trends and Technology

The authors proposed an efficient privacy preserving technique during the classification of data. They introduce a cryptographic based approach that protects centralized sample data sets utilized for decision tree mining of data. Preservation of privacy is applied to sanitize the samples prior to their release to third parties in order...

Provided By International Journal of Engineering Trends and Technology

Data hiding has been used for thousands of years to transmit data without being intercepted by unwanted viewers, therefore security becomes increasingly important for many applications, such as video surveillance, confidential transmission, military and medical etc. In November 2001 NIST published Rijndael as the proposed algorithm for AES (Advanced Encryption...

Provided By International Journal of Engineering Trends and Technology

The increase in the demand for wireless sensor networks has intensified studies which aim to obtain energy efficient solutions using backbone networks. But the backbone networks are very susceptible due to various reasons and posses the grand challenge in efficient wireless communication. Hence the new design scheme of energy efficient...

Provided By International Journal of Engineering Trends and Technology

Security makes the people to stay in the sense of vital modern technological improvements, especially focused in cryptography process. The authors have to consider the high level of security, the speed of encryption and the level of hardware which decides the cost in trade basis. This paper concentrates on KECCAK...

Provided By International Journal of Engineering Trends and Technology

Now-a-days it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So intrusion detection systems have become a needful component in...

Provided By International Journal of Engineering Trends and Technology

Now-a-day's secure data storage over cloud servers is an important research issue in the field of cloud computing, Even though various traditional approaches are there for cloud storage, but they are not optimal, because many of the traditional mechanisms are not optimal for data correctness, integrity and dynamic data support....

Provided By International Journal of Engineering Trends and Technology

Cloud computing security is sub-domain of computer security, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, applications, and the associated infrastructure resources of cloud computing. There are a number of security issues/concerns associated with cloud computing....

Provided By International Journal of Engineering Trends and Technology

Security is one of the important and interesting factors in the field of cloud computing, during the usage of cloud resources, Even though various traditional approaches are there for cloud storage, but they are not optimal providing optimal services because many of the traditional mechanisms are not optimal for data...

Provided By International Journal of Engineering Trends and Technology

Mobile Ad-hoc NETwork (MANET), a new form of Ad-hoc Network has gained the attention of today's research efforts and automotive industries to improve road safety and enable a wide variety of value added services. It needs security to implement the wireless environment and serves users with safety and non safety...

Provided By International Journal of Engineering Trends and Technology

Toll gates are usually considered an inconvenience by travelers not only for the cost of the toll, but also for the delays at toll booths, toll roads and bridges. In order to ensure a steady flow of traffic, both staff and drivers require easy access to an efficient communication system...

Provided By International Journal of Engineering Trends and Technology

MANET being a self configuring and self changing network becomes unpredictable in nature poses number of challenges like network attacks including blackholes, wormholes, and gray holes along with problems like routing efficiency, distribution of load, energy consumption and security issues. Attacks like blackholes causes the delays in communication by their...

Provided By International Journal of Engineering Trends and Technology

Wireless sensor networks came into prominence around the start of this millennium motivated by the omnipresent scenario of small-sized sensors with limited power deployed in large numbers over an area to monitor different phenomenon. The sole motivation of a large portion of research efforts has been to maximize the lifetime...

Provided By International Journal of Engineering Trends and Technology

Internet and computer networks are exposed to an increasing number of security threats. For new types of attacks are emerging constantly, developing flexibility and adaptability safety-oriented approaches is a serious problem. In this context, the anomaly based network Intrusion detection techniques are valuable technology to protect the target systems and...

Provided By International Journal of Engineering Trends and Technology

In this paper, the authors present a completely unsupervised approach to detect attacks, without relying on signatures, labeled traffic, or training. The unsupervised detection of network attacks represents an extremely challenging goal. The structure of the anomaly identified by the clustering algorithms is used to automatically construct specific filtering rules...

Provided By International Journal of Engineering Trends and Technology

Every sensor node is essential to know their location in the sensor network, even in the presence of malicious adversaries. In that the energy conservation and scalability are critical issues in wireless sensor network. In existing algorithm combines iterative gradient descent with selective pruning of inconsistent measurements to achieve high...

Provided By International Journal of Engineering Trends and Technology

Signature based NIDS are efficient at detecting attacks for what they are prepared for. This makes an intruder to focus on the new evasion technique to remain undetected. Emergence of new evasion technique may cause NIDS to fail. Unfortunately, most of these techniques are based on network protocols ambiguities, so...

Provided By International Journal of Engineering Trends and Technology

Security of data is important factor in data transmission through network. In this paper, the authors propose a new method using fuzzy set theory to enhance the security. The data in the form of text to be transmitted is encrypted by using the AES Rijndael algorithm. The encryption algorithm is...

Provided By International Journal of Engineering Trends and Technology

Increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems. The main problems are resource scarcity, frequent disconnections, battery problems and mobility. Mobile cloud computing can address the above problems by executing mobile applications on resource providers external to the mobile device. Mobile cloud...

Provided By International Journal of Engineering Trends and Technology

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?